[Full-disclosure] [scip_Advisory] NetGear RP114 Flooding Denial of Service

2005-12-12 Thread Marc Ruef
 
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

NetGear RP114 TCP SYN Flooding Denial of Service

scip AG Vulnerability (12/12/2005)

I. INTRODUCTION

NetGear is a popular manufacturer for network devices. Especially their
SOHO and appliance boxes are widely in private use. One of the user
products is RP114, a hub device with additional routing, packet and
simple content filtering functionality.

More Information are available at the official NetGear web site:

http://www.netgear.com

II. DESCRIPTION

Marc Ruef found an old fashioned denial of service flaw in this device.
By starting a transit TCP SYN flooding the routing between the internal
and the external interface is not possible anymore. An attacker can use
this to prevent legitimate users from accessing connected networks (e.g.
the WAN/Internet). Other devices by NetGear (e.g. routers and wlan
access points) may be also affected.

III. EXPLOITATION

Running TCP SYN flooding is very simple and can be realized by a large
variety of public attack tools. But it is also possible to initialize
such an attack my misusing a port scanning utility. Starting a scan with
nmap by Fyodor with the following command is able to reproduce the
denial of service:

   nmap -PS80 192.168.0.0/24

It does not matter how many target ports or hosts are defined. It is
just important to open approx. more than 740 persistant and half-open
connections. It is also required to scan something on the other
interface of the device than the attacker is connected to (e.g. scanning
an external host by sitting on the internal interface and vice versa).

IV. IMPACT

After a successfull attack no further routing between the networks is
possible anymore. This makes it impossible for legitimate users to
connect to the Internet or another network segment. During this time
direct connections to the affected device remains possible (e.g.
connection to the web interface or ping).

Just a reboot of the device can restore the productive status
immediately. Or you have to wait approx. 2 minutes for the device to
flush all half-open connections and return to full operational status.

V. DETECTION

The detection of this attack is not possible on the device itself. But
further security devices (e.g. dedicated firewalls or intrusion
detection systems) are able to detect this kind of classical attack.

VI. WORKAROUND

Do not plug the RP114 in not-trusted networks where the inter-connection
requires a high availability. In this case move to more professional
hardware that is able to handle a large amount of persistant connections
adequately.

VII. VENDOR RESPONSE

No response from NetGear came back. Due the fact the affected device
RP114 is not listed on the web site anymore and the last firmware is
dated back to 2002, no firmware update could be expected.

VIII. SOURCES

scip AG Vulnerability Database (german)
http://www.scip.ch/cgi-bin/smss/showadvf.pl

scip monthly Security Summary (german)
http://www.scip.ch/publikationen/smss/

computec.ch document data base (german)
http://www.computec.ch/download.php?list.7 (Denial of Service)
http://www.computec.ch/download.php?list.8 (Firewalling)
http://www.computec.ch/download.php?list.11 (Networking)

IX. DISCLOSURE TIMELINE

11/23/05 Marc Ruef verifies the for a long time suspected flaw
11/24/05 Inform the vendor by sending an email to
pressrelations-at-netgear.com
12/12/05 Public advisory

X. CREDITS

The vulnerability was discovered and analyzed by Marc Ruef at scip AG,
Switzerland.

Marc Ruef, scip AG
maru-at-scip.ch
http://www.scip.ch

A1. BIBLIOGRAPHY

See VIII. for some useful web ressources.

A2. LEGAL NOTICES

Copyright (c) 2005 by scip AG, Switzerland.

Permission is granted for the re-distribution of this alert. It may not
be edited in any way without permission of scip AG.

The information in the advisory is believed to be accurate at the time
of publishing. There are no warranties with regard to this information.
Neither the author nor the publisher accepts any liability for any
direct, indirect or consequential loss or damage from use of or reliance
on this advisory.

-BEGIN PGP SIGNATURE-
Version: PGP 8.0
Comment: http://www.scip.ch

iQA/AwUBQ508Dhe5hzJzqVMhEQLEagCfWfWq7GDfBBKu64QwoXTnt43aF84AoJwS
T4IiiG+jatHKlgo9aguvrwyn
=59cT
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] [scip_Advisory] NetGear RP114 Flooding Denial ofService

2005-12-12 Thread Morning Wood
dunno, but i know this has been an issue since the rt314 product (
1999-2000? )
a simple nmap -sS target trigers it external, and no supprise internal as
well.
( not fun running pentests behind one of these babys )
i dont know if you noticed that existing connections dont appear to be
affected
( IM and streaming traffic ) but dns generally gets hosed.

my2bits,
Donnie Werner
http://exploitlabs.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Phishers now abusing dynamic DNS services

2005-12-12 Thread pagvac
I got another Paypal phishing attempt today (I get about one every week :-) ).

The interesting thing about this attempt is that the phisher seems to
be using a dynamic DNS service to gain the trust from the victim.

In this case the html link was pointing to http://www.paypal.25u.com
which doesn't seem to resolve at this moment.

www.paypal.25u.com does of course look more legitimate than some
random IP address in which the word paypal is not included.


--
pagvac (Adrian Pastor)
www.ikwt.com - In Knowledge We Trust
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Phishers now abusing dynamic DNS services

2005-12-12 Thread Nick FitzGerald
pagvac wrote:

 [Full-disclosure] Phishers now abusing dynamic DNS services
 ^^^
 |||

now -- you don't think this is news do you???

I guess if you only get one (PayPal) phish per week your sampling is so 
disproportionate that you might have avoided getting one of these 
before, and thus it seems like a new development...


Regards,

Nick FitzGerald

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Phishers now abusing dynamic DNS services

2005-12-12 Thread Barrie Dempster
On Mon, 2005-12-12 at 10:22 +, pagvac wrote:
 I got another Paypal phishing attempt today (I get about one every week :-) ).
 
 The interesting thing about this attempt is that the phisher seems to
 be using a dynamic DNS service to gain the trust from the victim.
 
 In this case the html link was pointing to http://www.paypal.25u.com
 which doesn't seem to resolve at this moment.
 
 www.paypal.25u.com does of course look more legitimate than some
 random IP address in which the word paypal is not included.

They are new to phishing and didn't have the carding facilities to get
themselves a registered domain that looks similar enough to Paypal. ;-)

When this phishing attempt reaps them some required information they
will graduate to investing a few pennies in a domain.

This isn't terribly interesting or innovative, malware have been using
this sort of technique for quite some time.

-- 
With Regards..
Barrie Dempster (zeedo) - Fortiter et Strenue

He who hingeth aboot, geteth hee-haw Victor - Still Game

blog:  http://reboot-robot.net
sites: http://www.bsrf.org.uk - http://www.security-forums.com
ca:https://www.cacert.org/index.php?id=3


smime.p7s
Description: S/MIME cryptographic signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Phishers now abusing dynamic DNS services

2005-12-12 Thread pagvac
I don't know how new this is to be honest.

I just made a comment to the list because it was the first phishing
email I received that uses dynamic DNS and thought it was interesting.

On 12/12/05, Barrie Dempster [EMAIL PROTECTED] wrote:
 On Mon, 2005-12-12 at 10:22 +, pagvac wrote:
  I got another Paypal phishing attempt today (I get about one every week :-) 
  ).
 
  The interesting thing about this attempt is that the phisher seems to
  be using a dynamic DNS service to gain the trust from the victim.
 
  In this case the html link was pointing to http://www.paypal.25u.com
  which doesn't seem to resolve at this moment.
 
  www.paypal.25u.com does of course look more legitimate than some
  random IP address in which the word paypal is not included.

 They are new to phishing and didn't have the carding facilities to get
 themselves a registered domain that looks similar enough to Paypal. ;-)

 When this phishing attempt reaps them some required information they
 will graduate to investing a few pennies in a domain.

 This isn't terribly interesting or innovative, malware have been using
 this sort of technique for quite some time.

 --
 With Regards..
 Barrie Dempster (zeedo) - Fortiter et Strenue

 He who hingeth aboot, geteth hee-haw Victor - Still Game

 blog:  http://reboot-robot.net
 sites: http://www.bsrf.org.uk - http://www.security-forums.com
 ca:https://www.cacert.org/index.php?id=3





--
pagvac (Adrian Pastor)
www.ikwt.com - In Knowledge We Trust
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [SECURITY] [DSA 919-1] New curl packages fix potential security problem

2005-12-12 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 919-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
December 12th, 2005 http://www.debian.org/security/faq
- --

Package: curl
Vulnerability  : buffer overflow
Problem type   : local (remote)
Debian-specific: no
CVE ID : CVE-2005-4077 CVE-2005-3185
BugTraq ID : 15756 15102 15647
Debian Bug : 342339 342696

Several problems were discovered in libcurl, a multi-protocol file
transfer library.  The Common Vulnerabilities and Exposures project
identifies the following problems:

CVE-2005-3185

A vulnerability has been discovered a buffer overflow in libcurl
that could allow the execution of arbitrary code.

CVE-2005-4077

Stefan Esser discovered several off-by-one errors that allows
local users to trigger a buffer overflow and cause a denial of
service or bypass PHP security restrictions via certain URLs.

For the old stable distribution (woody) these problems have been fixed in
version 7.9.5-1woody1.

For the stable distribution (sarge) these problems have been fixed in
version 7.13.2-2sarge4.  This update also includes a bugfix against
data corruption.

For the unstable distribution (sid) these problems have been fixed in
version 7.15.1-1.

We recommend that you upgrade your libcurl packages.


Upgrade Instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- 

  Source archives:

http://security.debian.org/pool/updates/main/c/curl/curl_7.9.5-1woody1.dsc
  Size/MD5 checksum:  603 c7980d3b9589f2ef20390a70e0b4de74

http://security.debian.org/pool/updates/main/c/curl/curl_7.9.5-1woody1.diff.gz
  Size/MD5 checksum:16631 e35ec4ff7161fa158c04c8cbf716d159
http://security.debian.org/pool/updates/main/c/curl/curl_7.9.5.orig.tar.gz
  Size/MD5 checksum:   682397 a4df6bb5aa8962c204e73c8f98077928

  Alpha architecture:


http://security.debian.org/pool/updates/main/c/curl/curl_7.9.5-1woody1_alpha.deb
  Size/MD5 checksum:   118498 584184fdc57b0b302b1c16b293222492

http://security.debian.org/pool/updates/main/c/curl/libcurl-dev_7.9.5-1woody1_alpha.deb
  Size/MD5 checksum:   195922 6a58bcdea99e866fdfbad573b3d6ef8d

http://security.debian.org/pool/updates/main/c/curl/libcurl2_7.9.5-1woody1_alpha.deb
  Size/MD5 checksum:   116574 799b6ccd5c223cd8580c8e4fc610fef8

  ARM architecture:


http://security.debian.org/pool/updates/main/c/curl/curl_7.9.5-1woody1_arm.deb
  Size/MD5 checksum:   114452 028489639e478d66a6223c7a2175cac9

http://security.debian.org/pool/updates/main/c/curl/libcurl-dev_7.9.5-1woody1_arm.deb
  Size/MD5 checksum:   172978 ad531498826aaa48ec0e2eb5c2df7207

http://security.debian.org/pool/updates/main/c/curl/libcurl2_7.9.5-1woody1_arm.deb
  Size/MD5 checksum:   101852 c7df9a970ef2f5a1ac11f6aae2c539be

  Intel IA-32 architecture:


http://security.debian.org/pool/updates/main/c/curl/curl_7.9.5-1woody1_i386.deb
  Size/MD5 checksum:   112954 55c016b60375a465dd139b25a9860e3b

http://security.debian.org/pool/updates/main/c/curl/libcurl-dev_7.9.5-1woody1_i386.deb
  Size/MD5 checksum:   163696 c88d95d412ef529c8eebc9d21a5d6006

http://security.debian.org/pool/updates/main/c/curl/libcurl2_7.9.5-1woody1_i386.deb
  Size/MD5 checksum:   100482 ca2e1ea6b250814e75101a9936bf

  Intel IA-64 architecture:


http://security.debian.org/pool/updates/main/c/curl/curl_7.9.5-1woody1_ia64.deb
  Size/MD5 checksum:   122062 7476d36d7530caab9aa08c8c24bc7b17

http://security.debian.org/pool/updates/main/c/curl/libcurl-dev_7.9.5-1woody1_ia64.deb
  Size/MD5 checksum:   210310 5ef9167039cdf11ba26f5380265e9f0e

http://security.debian.org/pool/updates/main/c/curl/libcurl2_7.9.5-1woody1_ia64.deb
  Size/MD5 checksum:   139432 6c924348404f96a9d534485d231da013

  HP Precision architecture:


http://security.debian.org/pool/updates/main/c/curl/curl_7.9.5-1woody1_hppa.deb
  Size/MD5 checksum:   116424 a94545e972184368284431251dc81bc0

http://security.debian.org/pool/updates/main/c/curl/libcurl-dev_7.9.5-1woody1_hppa.deb
  Size/MD5 checksum:   186366 a9ef087b21652930a452f9aa61e17040

http://security.debian.org/pool/updates/main/c/curl/libcurl2_7.9.5-1woody1_hppa.deb
  Size/MD5 checksum:   112976 

Re: [Full-disclosure] Phishers now abusing dynamic DNS services

2005-12-12 Thread Florian Weimer
* pagvac:

 The interesting thing about this attempt is that the phisher seems to
 be using a dynamic DNS service to gain the trust from the victim.

to gain trust? Hm?

This is not really a new thing:

2005-04-19 08:24:49  ebayfraud.dyndns.org  A  220.110.65.252
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


RE: [Full-disclosure] Snort as IDS/IPS in mission-critical enterprisenetwork

2005-12-12 Thread Chris Cutler

Dear all,

Thanks for valuable input. It was very much appreciated. I kind of get the 
impression that Snort is very stable product but it needs a lot of effort 
configuring, monitoring and customizing. We will definitely give it a try. I 
assume I did not mention, we will be using Windows binary. Is this as stable 
as Linux version?


Some of you mentioned that many commercial productions are based on Snort. 
Can anyone name another product besides those from Sourcefire?


One of the products that you might want to look at is from CounterSnipe, 
www.countersnipe.com They do SNORT based IDS/IPS devices at reasonable 
pricing.



Thanks again,
Native.Code



On 12/10/05, Technica Forensis [EMAIL PROTECTED] wrote:

what ever happened to FPGA/hardware based NIDS classifiers?  There
seemed to be a number of papers and even some open source (open cores) code 
to do 10GigE with ease.


still in the research labs?


http://www.cloudshield.com
and have your pocketbook ready, 'cause it ain't cheap.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

_
Are you using the latest version of MSN Messenger? Download MSN Messenger 
7.5 today! http://messenger.msn.co.uk


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [USN-227-1] xpdf vulnerabilities

2005-12-12 Thread Martin Pitt
===
Ubuntu Security Notice USN-227-1  December 12, 2005
xpdf/cupsys/tetex-bin/kdegraphics/koffice vulnerabilities
CVE-2005-3191, CVE-2005-3192, CVE-2005-3193
===

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)

The following packages are affected:

cupsys
cupsys-bsd
cupsys-client
kpdf
kword
libpoppler0c2
tetex-bin
xpdf-reader
xpdf-utils

The problem can be corrected by upgrading the affected package to the
following versions:

Ubuntu 4.10:
  xpdf:  3.00-8ubuntu1.9
  cupsys:1.1.20final+cvs20040330-4ubuntu16.9
  tetex-bin: 2.0.2-21ubuntu0.7

Ubuntu 5.04:
  xpdf:  3.00-11ubuntu3.5
  tetex-bin: 2.0.2-25ubuntu0.3
  kword: 1:1.3.5-2ubuntu1.2
  kpdf:  4:3.4.0-0ubuntu3.2

Ubuntu 5.10:
  libpoppler0c2: 0.4.2-0ubuntu6.4
  tetex-bin: 2.0.2-30ubuntu3.3
  kword: 1:1.4.1-0ubuntu7.1
  kpdf:  4:3.4.3-0ubuntu2.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

infamous41md discovered several integer overflows in the XPDF code,
which is present in xpdf, the Poppler library, tetex-bin, KOffice, and
kpdf. By tricking an user into opening a specially crafted PDF file,
an attacker could exploit this to execute arbitrary code with the
privileges of the application that processes the document.

The CUPS printing system also uses XPDF code to convert PDF files to
PostScript. By attempting to print such a crafted PDF file, a remote
attacker could execute arbitrary code with the privileges of the
printer server (user 'cupsys').


Updated packages for Ubuntu 4.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.1.20final+cvs20040330-4ubuntu16.9.diff.gz
  Size/MD5:  1354803 79cfe1fa5dae941bbc7f8088e971075e

http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.1.20final+cvs20040330-4ubuntu16.9.dsc
  Size/MD5:  867 117933cbf2802c955d3a1506500d9cd6

http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.1.20final+cvs20040330.orig.tar.gz
  Size/MD5:  5645146 5eb5983a71b26e4af841c26703fc2f79

http://security.ubuntu.com/ubuntu/pool/main/t/tetex-bin/tetex-bin_2.0.2-21ubuntu0.7.diff.gz
  Size/MD5:   113361 b712d9459abfc9605a3586758ac29005

http://security.ubuntu.com/ubuntu/pool/main/t/tetex-bin/tetex-bin_2.0.2-21ubuntu0.7.dsc
  Size/MD5: 1062 0e8db1c5cf32886db51feb143681bfad

http://security.ubuntu.com/ubuntu/pool/main/t/tetex-bin/tetex-bin_2.0.2.orig.tar.gz
  Size/MD5: 11677169 8f02d5940bf02072ce5fe05429c90e63

http://security.ubuntu.com/ubuntu/pool/main/x/xpdf/xpdf_3.00-8ubuntu1.9.diff.gz
  Size/MD5:49770 b763f31b209b1b607fe33b03a9b9b0f1
http://security.ubuntu.com/ubuntu/pool/main/x/xpdf/xpdf_3.00-8ubuntu1.9.dsc
  Size/MD5:  788 2da7a6699b7f7aa09f9b9a57a1b33953
http://security.ubuntu.com/ubuntu/pool/main/x/xpdf/xpdf_3.00.orig.tar.gz
  Size/MD5:   534697 95294cef3031dd68e65f331e8750b2c2

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/x/xpdf/xpdf-common_3.00-8ubuntu1.9_all.deb
  Size/MD5:56702 9cc57970a1c1af14b6381481dab064fa

http://security.ubuntu.com/ubuntu/pool/main/x/xpdf/xpdf_3.00-8ubuntu1.9_all.deb
  Size/MD5: 1274 3a54b82f2cb0dd3476d4db50bf2fbb09

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.1.20final+cvs20040330-4ubuntu16.9_amd64.deb
  Size/MD5:59258 e500fc8efc117324245de618d443e3e1

http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.1.20final+cvs20040330-4ubuntu16.9_amd64.deb
  Size/MD5:   107524 c29e059b874a6d5880375f4f4c3c3d6e

http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.1.20final+cvs20040330-4ubuntu16.9_amd64.deb
  Size/MD5:  3615184 f5758133013d9e839d6f89246a7318e7

http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.1.20final+cvs20040330-4ubuntu16.9_amd64.deb
  Size/MD5:62870 536d6b0d3cd73face92870667504dcf6

http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.1.20final+cvs20040330-4ubuntu16.9_amd64.deb
  Size/MD5:53532 29105d719e2914a82e327f0d8e2eadf5

http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.1.20final+cvs20040330-4ubuntu16.9_amd64.deb
  Size/MD5:   102006 4e4fc2dc55b192a9d236f059c3c7234b

http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-gnutls10_1.1.20final+cvs20040330-4ubuntu16.9_amd64.deb
  Size/MD5:75068 a022daf8eb0d3b75d47b79a40cec0a78

http://security.ubuntu.com/ubuntu/pool/main/t/tetex-bin/libkpathsea-dev_2.0.2-21ubuntu0.7_amd64.deb
  Size/MD5:72758 ff23b91476594cf458f1054baee50b56


[Full-disclosure] [USN-222-2] Perl vulnerability

2005-12-12 Thread Martin Pitt
===
Ubuntu Security Notice USN-222-2  December 12, 2005
perl vulnerability
CVE-2005-3962
===

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)

The following packages are affected:

libperl5.8
perl-base

The problem can be corrected by upgrading the affected package to
version 5.8.4-2ubuntu0.6 (for Ubuntu 4.10), 5.8.4-6ubuntu1.2 (for
Ubuntu 5.04), or 5.8.7-5ubuntu1.2 (for Ubuntu 5.10).  In general, a
standard system upgrade is sufficient to effect the necessary changes.

Details follow:

USN-222-1 fixed a vulnerability in the Perl interpreter. It was
discovered that the version of USN-222-1 was not sufficient to handle
all possible cases of malformed input that could lead to arbitrary
code execution, so another update is necessary.

Original advisory:

  Jack Louis of Dyad Security discovered that Perl did not
  sufficiently check the explicit length argument in format strings.
  Specially crafted format strings with overly large length arguments
  led to a crash of the Perl interpreter or even to execution of
  arbitrary attacker-defined code with the privileges of the user
  running the Perl program.

  However, this attack was only possible in insecure Perl programs
  which use variables with user-defined values in string
  interpolations without checking their validity.


Updated packages for Ubuntu 4.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/p/perl/perl_5.8.4-2ubuntu0.6.diff.gz
  Size/MD5:65287 5b3e19646e2091eb9294220d0f7db14f
http://security.ubuntu.com/ubuntu/pool/main/p/perl/perl_5.8.4-2ubuntu0.6.dsc
  Size/MD5:  727 f56ec1862af2a154066ea04d950ae74c
http://security.ubuntu.com/ubuntu/pool/main/p/perl/perl_5.8.4.orig.tar.gz
  Size/MD5: 12094233 912050a9cb6b0f415b76ba56052fb4cf

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/universe/p/perl/libcgi-fast-perl_5.8.4-2ubuntu0.6_all.deb
  Size/MD5:37120 34c8f6b057066ed0b5e07ac1a4b783b6

http://security.ubuntu.com/ubuntu/pool/main/p/perl/perl-doc_5.8.4-2ubuntu0.6_all.deb
  Size/MD5:  7049588 2e0dedeaf0d5ebb7f5db7b0fc7885993

http://security.ubuntu.com/ubuntu/pool/main/p/perl/perl-modules_5.8.4-2ubuntu0.6_all.deb
  Size/MD5:  2181262 d51dcf8f5d749b48a95111e334e19e40

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/p/perl/libperl-dev_5.8.4-2ubuntu0.6_amd64.deb
  Size/MD5:   605672 c5af1be0954268bd9dec4b350a5f6e60

http://security.ubuntu.com/ubuntu/pool/main/p/perl/libperl5.8_5.8.4-2ubuntu0.6_amd64.deb
  Size/MD5: 1032 fda7bcbdfdc9edce6299dafa80cf8af9

http://security.ubuntu.com/ubuntu/pool/main/p/perl/perl-base_5.8.4-2ubuntu0.6_amd64.deb
  Size/MD5:   787486 379267d6352e32ea9c19705632aa31ff

http://security.ubuntu.com/ubuntu/pool/universe/p/perl/perl-debug_5.8.4-2ubuntu0.6_amd64.deb
  Size/MD5:  3820376 216a2a3838f56e5d130efb6bc81216ec

http://security.ubuntu.com/ubuntu/pool/main/p/perl/perl-suid_5.8.4-2ubuntu0.6_amd64.deb
  Size/MD5:32970 12370fa42f20842b0f1e2700d8becef6

http://security.ubuntu.com/ubuntu/pool/main/p/perl/perl_5.8.4-2ubuntu0.6_amd64.deb
  Size/MD5:  3834442 7716de916cd192cb0994880f7edc7c32

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/p/perl/libperl-dev_5.8.4-2ubuntu0.6_i386.deb
  Size/MD5:   547084 1adfa9c3510df872ca4002d90e6ebf0f

http://security.ubuntu.com/ubuntu/pool/main/p/perl/libperl5.8_5.8.4-2ubuntu0.6_i386.deb
  Size/MD5:   494308 2744b8ac7f93c771240b12fb4d02b36e

http://security.ubuntu.com/ubuntu/pool/main/p/perl/perl-base_5.8.4-2ubuntu0.6_i386.deb
  Size/MD5:   727906 7f2faf7b54a7e0398c807a46f0c17817

http://security.ubuntu.com/ubuntu/pool/universe/p/perl/perl-debug_5.8.4-2ubuntu0.6_i386.deb
  Size/MD5:  3631738 82ad474e7516dec454da629a93128848

http://security.ubuntu.com/ubuntu/pool/main/p/perl/perl-suid_5.8.4-2ubuntu0.6_i386.deb
  Size/MD5:30930 eed03dfcc0265086b8e009ab614041ba

http://security.ubuntu.com/ubuntu/pool/main/p/perl/perl_5.8.4-2ubuntu0.6_i386.deb
  Size/MD5:  3229914 6be57f704821ee42e2da1580da7b68f5

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/p/perl/libperl-dev_5.8.4-2ubuntu0.6_powerpc.deb
  Size/MD5:   561444 65381c155d8b7a4c2b3ae8d0ee8f4343

http://security.ubuntu.com/ubuntu/pool/main/p/perl/libperl5.8_5.8.4-2ubuntu0.6_powerpc.deb
  Size/MD5: 1040 731ffc922ffd0879497c1b5ff1628b6a

http://security.ubuntu.com/ubuntu/pool/main/p/perl/perl-base_5.8.4-2ubuntu0.6_powerpc.deb
  Size/MD5:   718886 0dd2fb65fd29067c751d523a4800363c


Re: [Full-disclosure] Phishers now abusing dynamic DNS services

2005-12-12 Thread pagvac
On 12/12/05, Florian Weimer [EMAIL PROTECTED] wrote:
 * pagvac:

  The interesting thing about this attempt is that the phisher seems to
  be using a dynamic DNS service to gain the trust from the victim.

 to gain trust? Hm?

Yes.

What I mean is that the average user will trust more an URL when
seeing the word paypal in it as a domain name, rather than some
dodgy-looking numerical IP address, with a sub-directory called
paypal.

e.g.:

http://1.2.3.4/vulnerable_app/paypal

versus

http://www.paypal.25u.com


Personall I would think that more users would trust the second link.


 This is not really a new thing:

 2005-04-19 08:24:49  ebayfraud.dyndns.org  A  220.110.65.252



--
pagvac (Adrian Pastor)
www.ikwt.com - In Knowledge We Trust
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Famous n3td3v quotes - The Director's Cut (out now on DVD)

2005-12-12 Thread Stan Bubrouski
On 12/11/05, n3td3v [EMAIL PROTECTED] wrote:
 This list is for people to disclose security information, not for
 random people to disrespect others who do disclose vulnerabilities. It

THAT IS ALL YOU DO!!!  You post some XSS vuln somewhere then criticize
everyone else on the list while touting how awesome and l337 you are. 
If all you did was post vulnerabilities do you think people would
start threads dedicated to your stupidity?


 was a personal attack, because you're trying to make fun of serious
 comments i've made. You've taken all of the quotes out of context, so
 they make little sense to anyone.


The problem is you are a tool.  You find a bug in Yahoo or Google then
diss the other 7 billion people who haven't or haven't bothered.  You
then presume they are not as skilled as you then put them down in the
most childish ways while crticizing them for doing the same in return.

You then continue to start threads, spread misinformation about people
and then tell them they're stupid.

Suggestion: Turn off your computer and go back to watching Seasame
Street on your PSP.

-sb

 On 12/11/05, Steve Russell [EMAIL PROTECTED] wrote:
  It was not a personal attack - it was humour, the
  difference being you obviously cannot tell them apart.
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Re: McAfee VirusScan vs Metasploit Framework v2.x

2005-12-12 Thread Bipin Gautam
The sad thing is AV vendor don't have a proper boundary on their
products work-scope. Though, giving a clean chit to products like
Claria/Gator is a big shame... I still strongly support the move of AV
vendors to classify product like nmap, netcat, metasploit as POTENTIAL
THREATS; though it's childish to treat those product equv. as
hack-tools. What AV vendor currently lack is a proper and CLEAR way to
let the users choose the level of security they want. All AV vendors
still lack even basics as, proper  basic common standards that are
followed by all AV products.

BUT guys common… so you want to share the stupid flames of users over
your security product with the AV vendors as they have classified it
as a BAD-TOOL. Will that make you feel better?  It's more of your
headache  responsibility to let the users know before download that
your security product might be classified by AV as potential threats
as, YOU KNOW they may be used for either good or bad purpose. I don't
suppose Fyodor will take any responsibility for the action of a
malicious user if nmap is used for some malicious purpose??? How AV
software would know whether software's like netcat, metasploit or nmap
found in a machine is put there by a legitimate user or by a malicious
person willing to some further evil deeds. So as a proactive measure
they rate the software's as a threat. DEFAULT DENY. Makes sense to me…
( but I agree AV vendors lack proper classification ) hey... User
always has the option to ask their AV to ignore the particular
file/directory if they own the privilege in the machine anyways.

So what's the point in discussing such stuffs??? oOo ya... a proper
and CLEAR classification from the vendors side so that the user can
easily choose the level of protection he/she wants. But that needs
some design changes not just on the AV signatures. Let's hope we'll
see those on some upcoming version.

Would you yank out Canvas, and Core Impact products as well?
oh, wait... there probably isn't a sig for those so you wouldn't know.
Is that just I or everyone is hearing the whispering words;
Partiality… shortsightedness…

best regards,
-Bipin Gautam
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re[2]: [Full-disclosure] Phishers now abusing dynamic DNS services

2005-12-12 Thread phased
yeah this is definitly nothing new

-Original Message-
From: pagvac [EMAIL PROTECTED]
To: full-disclosure@lists.grok.org.uk
Date: Mon, 12 Dec 2005 15:43:36 +
Subject: Re: [Full-disclosure] Phishers now abusing dynamic DNS services

 On 12/12/05, Florian Weimer [EMAIL PROTECTED] wrote:
  * pagvac:
 
   The interesting thing about this attempt is that the phisher seems to
   be using a dynamic DNS service to gain the trust from the victim.
 
  to gain trust? Hm?
 
 Yes.
 
 What I mean is that the average user will trust more an URL when
 seeing the word paypal in it as a domain name, rather than some
 dodgy-looking numerical IP address, with a sub-directory called
 paypal.
 
 e.g.:
 
 http://1.2.3.4/vulnerable_app/paypal
 
 versus
 
 http://www.paypal.25u.com
 
 
 Personall I would think that more users would trust the second link.
 
 
  This is not really a new thing:
 
  2005-04-19 08:24:49  ebayfraud.dyndns.org  A  220.110.65.252
 
 
 
 --
 pagvac (Adrian Pastor)
 www.ikwt.com - In Knowledge We Trust
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/
 
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] iDEFENSE Security Advisory 12.12.05: SCO Unixware Setuid 'uidadmin' Scheme Buffer Overflow Vulnerability

2005-12-12 Thread [EMAIL PROTECTED]

SCO Unixware Setuid 'uidadmin' Scheme Buffer Overflow Vulnerability

iDefense Security Advisory 12.12.05

www.iDefense.com/application/poi/display?id=350type=vulnerabilities
December 12, 2005

I. BACKGROUND

SCO Unixware is a Unix operating system that runs on many OEM platforms.

II. DESCRIPTION

Local exploitation of a buffer overflow vulnerability in the uidadmin
binary included in multiple versions of The SCO Group Inc.'s Unixware
allows attackers to gain root privileges.

The vulnerability specifically exists because of a failure to check the
length of user specified file input. If the user prepares a file longer
than 1,600 bytes and supplies the path to that file using the -S
option of uidadmin, a stack based buffer overflow occurs. This leads to
the execution of arbitrary code with root privileges, as uidadmin is
setuid root by default.

III. ANALYSIS

Successful exploitation of this vulnerability requires that a user have
local access to the system. This would allow the user to gain super user
privileges.

IV. DETECTION

iDefense has confirmed the existence of this vulnerability in SCO
Unixware versions 7.1.3 and 7.1.4. All previous versions of SCO Unixware
are  suspected to be vulnerable.

V. WORKAROUND

Remove the setuid bit from the ppp binary:

 chmod u-s /unixware/usr/bin/uidadmin

VI. VENDOR RESPONSE

The vendor has released the following update to address this
vulnerability:

 ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.54

VII. CVE INFORMATION

The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CVE-2005-3903 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org), which standardizes names for
security problems.

VIII. DISCLOSURE TIMELINE

10/12/2005  Initial vendor notification
10/13/2005  Initial vendor response
12/12/2005  Coordinated public disclosure

IX. CREDIT

iDefense Labs is credited with the discovery of this vulnerability.

Get paid for vulnerability research
http://www.iDefense.com/poi/teams/vcp.jsp

Free tools, research and upcoming events
http://labs.iDefense.com

X. LEGAL NOTICES

Copyright © 2005 iDefense, Inc.

Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDefense. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically, please
email [EMAIL PROTECTED] for permission.

Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct, indirect,
or consequential loss or damage arising from use of, or reliance on,
this information.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] (no subject)

2005-12-12 Thread John Smith
Firstly, the user ID isn't used anywhere, although its captured.
The KPID is used to determine the unique algorithm used for time-delay, and the static control algorithm used to create the dynamic encryption for the unit's auth sequence, (the two hashes created using date/time sequence and dynamic algorithm based off of control algorithm). I might not have explained that very well - sorry. One consideration would be the large amount of different algorithms to keep track of, and whether a dynamically generated algorithm can be trusted to have invariably similar characteristics, (ie strength, any collisions).
Second, this is still subject to a mitm attack.
Well, I know that the MITM attack would still be possible with the authenticated session, as thehost is compromised, but I thought the question was how to keep the authentication itself private, as using a compromised system means everything is available anyway. Perhaps a kind of keep-alive using the time-delay could help prevent excessively easy interception of the session...
Thirdly, any message or session data is not protected as coming from the same site to/from user, compromised workstation or keypad. Indeed, a compromised machine may simply 'route' an attacker's data to appear to originate from the machine that commenced the session.
Now, the session could definitely be stolen, but again, I thought we were assuming any session was going to be compromised already. Maybe I missed the point.If we have to protect more then the authentication scheme, from what little I know,there would have to be NO involvement with the compromised machine, or users who can decrypt things themselves..hehehe - decoder ring to check your email... :) Even hardware interrupts could be intercepted and analysed, I believe though I'm not positive, if you, say,decided to setup a method of direct communication between the USB peripheral and the user-interfaces, (which would be cool, anyway). 
Well, that was my thought. I'm no engineer, so it was more of a stab in the dark, but thanks for your reply :) I think the time-delay thing and the control algorithm dynamically generating unique algorithms during encryption could really be expanded on. I haven't seen much along those lines, personally. Perhaps its because of the overhead.

-- 
___Play 100s of games for FREE! http://games.mail.com/
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [USN-228-1] curl library vulnerability

2005-12-12 Thread Martin Pitt
===
Ubuntu Security Notice USN-228-1  December 12, 2005
curl vulnerability
CVE-2005-4077
===

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)

The following packages are affected:

libcurl2
libcurl3

The problem can be corrected by upgrading the affected package to
version 7.12.0.is.7.11.2-1ubuntu0.3 (for Ubuntu 4.10),
7.12.3-2ubuntu3.5 (libcurl3 for Ubuntu 5.04), 1:7.11.2-12ubuntu3.3
(libcurl2 for Ubuntu 5.04), or 7.14.0-2ubuntu1.2 (for Ubuntu 5.10).
In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Stefan Esser discovered several buffer overflows in the handling of
URLs. By attempting to load an URL with a specially crafted invalid
hostname, a local attacker could exploit this to execute arbitrary
code with the privileges of the application that uses the cURL
library.

It is not possible to trick cURL into loading a malicious URL with an
HTTP redirect, so this vulnerability was usually not exploitable
remotely. However, it could be exploited locally to e. g. circumvent
PHP security restrictions.


Updated packages for Ubuntu 4.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/c/curl/curl_7.12.0.is.7.11.2-1ubuntu0.3.diff.gz
  Size/MD5:   160919 5cf0f9c8ba68210e8e4c2758e60b2580

http://security.ubuntu.com/ubuntu/pool/main/c/curl/curl_7.12.0.is.7.11.2-1ubuntu0.3.dsc
  Size/MD5:  707 ba339f748a4aa0df95fad727d17351a6

http://security.ubuntu.com/ubuntu/pool/main/c/curl/curl_7.12.0.is.7.11.2.orig.tar.gz
  Size/MD5:  1435629 25e6617ea7dec34d072426942b77801f

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/c/curl/curl_7.12.0.is.7.11.2-1ubuntu0.3_amd64.deb
  Size/MD5:   108786 b2c4b1a909e7df51f1b473bad16eb5da

http://security.ubuntu.com/ubuntu/pool/main/c/curl/libcurl2-dbg_7.12.0.is.7.11.2-1ubuntu0.3_amd64.deb
  Size/MD5:  1043928 85dd2975faa3caf60fe4af59227e73ea

http://security.ubuntu.com/ubuntu/pool/main/c/curl/libcurl2-dev_7.12.0.is.7.11.2-1ubuntu0.3_amd64.deb
  Size/MD5:   568360 7da61685491a4bf50cb4b93a2ec908c7

http://security.ubuntu.com/ubuntu/pool/universe/c/curl/libcurl2-gssapi_7.12.0.is.7.11.2-1ubuntu0.3_amd64.deb
  Size/MD5:   112112 c643fd29e22a8b36bab08dcb26ff419c

http://security.ubuntu.com/ubuntu/pool/main/c/curl/libcurl2_7.12.0.is.7.11.2-1ubuntu0.3_amd64.deb
  Size/MD5:   224822 5e3afe9b190593442354151c4175ac07

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/c/curl/curl_7.12.0.is.7.11.2-1ubuntu0.3_i386.deb
  Size/MD5:   107950 6bdaa7ac9bc28865bf2f8ea98c033638

http://security.ubuntu.com/ubuntu/pool/main/c/curl/libcurl2-dbg_7.12.0.is.7.11.2-1ubuntu0.3_i386.deb
  Size/MD5:  1029246 5bf95fcb5356c46a48647e90c106893a

http://security.ubuntu.com/ubuntu/pool/main/c/curl/libcurl2-dev_7.12.0.is.7.11.2-1ubuntu0.3_i386.deb
  Size/MD5:   556842 9a83e697723e0498b189b661856a5f44

http://security.ubuntu.com/ubuntu/pool/universe/c/curl/libcurl2-gssapi_7.12.0.is.7.11.2-1ubuntu0.3_i386.deb
  Size/MD5:   110126 ffd39f845dcd54c1725dd5b530f69880

http://security.ubuntu.com/ubuntu/pool/main/c/curl/libcurl2_7.12.0.is.7.11.2-1ubuntu0.3_i386.deb
  Size/MD5:   223078 641bab72067de0f032fefcfe374a21b9

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/c/curl/curl_7.12.0.is.7.11.2-1ubuntu0.3_powerpc.deb
  Size/MD5:   110280 f01bb0abf8a7ee14df4f5ce45c7edcb3

http://security.ubuntu.com/ubuntu/pool/main/c/curl/libcurl2-dbg_7.12.0.is.7.11.2-1ubuntu0.3_powerpc.deb
  Size/MD5:  1053056 d14dafe8fa84b5c189a1b9434fab4166

http://security.ubuntu.com/ubuntu/pool/main/c/curl/libcurl2-dev_7.12.0.is.7.11.2-1ubuntu0.3_powerpc.deb
  Size/MD5:   573702 d4e343709827dc77b6e3caf8c3383145

http://security.ubuntu.com/ubuntu/pool/universe/c/curl/libcurl2-gssapi_7.12.0.is.7.11.2-1ubuntu0.3_powerpc.deb
  Size/MD5:   116522 add20579ac6b24154674095b8e8152ff

http://security.ubuntu.com/ubuntu/pool/main/c/curl/libcurl2_7.12.0.is.7.11.2-1ubuntu0.3_powerpc.deb
  Size/MD5:   229658 ca56d9ba1a7445ac4638a79efe985cd6

Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/c/curl/curl_7.12.3-2ubuntu3.5.diff.gz
  Size/MD5:  1262740 00b378df6454659925ffb8317de89a33

http://security.ubuntu.com/ubuntu/pool/main/c/curl/curl_7.12.3-2ubuntu3.5.dsc
  Size/MD5:  832 19e220d065283b4c118a9a7576dcab13
http://security.ubuntu.com/ubuntu/pool/main/c/curl/curl_7.12.3.orig.tar.gz
  Size/MD5:  2135477 653d1227c58ca870f95c488db62033f8

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)



Re: [Full-disclosure] Phishers now abusing dynamic DNS services

2005-12-12 Thread Graham Reed

pagvac writes:

What I mean is that the average user will trust more an URL when
seeing the word paypal in it as a domain name, rather than some
dodgy-looking numerical IP address, with a sub-directory called
paypal.


Most users won't even see or notice where the link goes, that's why it 
works. 

What you do need the hostname for is, to bypass the alarms on webmail 
services like Yahoo!, which will display a scary pop-up if you click on a 
link that's got a numeric IP address for the hostname. 

It won't alarm on most other types of names.  At least, I was able to make 
up a name and point something in my domain at an arbitrary IP and Yahoo! 
stopped showing the warning. 

They may have a blacklist, which would catch phish sites once people know 
about the hostname. 

Of course, without HTML mail, they wouldn't be able to show one thing and 
mean another 

And eBay doesn't help the whole situation: if you read the HTML version of 
eBay favorite search mail, the links take you to some site other than 
eBay.  (Actually, a doubleclick.net address--which is not resolvable on my 
network.)  Fortunately, the plain-text version has right-to-ebay.com links. 


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Re: McAfee VirusScan vs Metasploit Framework v2.x

2005-12-12 Thread Yvan Boily

BUT guys common… so you want to share the stupid flames of users overyour security product with the AV vendors as they have classified it
as a BAD-TOOL. Will that make you feel better?It's more of yourheadache  responsibility to let the users know before download thatyour security product might be classified by AV as potential threats
as, YOU KNOW they may be used for either good or bad purpose. I don'tsuppose Fyodor will take any responsibility for the action of amalicious user if nmap is used for some malicious purpose??? How AVsoftware would know whether software's like netcat, metasploit or nmap
found in a machine is put there by a legitimate user or by a maliciousperson willing to some further evil deeds. So as a proactive measurethey rate the software's as a threat. DEFAULT DENY. Makes sense to me…
( but I agree AV vendors lack proper classification ) hey... Useralways has the option to ask their AV to ignore the particularfile/directory if they own the privilege in the machine anyways.


The issue isn't that it is a default deny approach; it is the case that when a user requests additional information from the tool that would delete the software, they receive a very skewed perspective.

Anyone who uses McAffee want to download the load of FoundStone tools and determine if any of those (including SuperScan!) qualify as 'hacking tools'?
http://www.foundstone.com/resources/freetools.htm
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Inside AV engines?

2005-12-12 Thread Jeroen
For penetration testing on Wintel system, I often use netcat.exe and stuff
like pwdump. More and more I need to disable anti-virus services before
running the tools to avoid alarms and auto-deletion of the applications. It
works but it isn't an ideal situation since theoretically a network can be
infected while the AV-services are down. Recompiling tools is an option
since the source of many tools I use is available. The question is (before I
burn useless CPU cycles): can someone help me getting info about the inside
of AV engines? Will addition of some rubbish to the code do the trick (-
other checksum), do I need to change some core code or is it a mission
impossible anyway? Who can help for example getting some useful research
papers on the subject of detecting viruses and how to bypass mechanisms
used? Any help will be appreciated.


Greets,

Jeroen


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Inside AV engines?

2005-12-12 Thread [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I would like to have much time to explain you clearly how to but sorry I
will do quick cos I disconnect soon:

what do you need to do on the infected file is to split it in different
part with the same size, then you sort out the infected part and the one
not. you re-split those files again but in smaller size, you sort out
again the infected one and the one not , etc , you will find out quickly
the detected signature with a byte precision.

tip: a tool outta there does it really well , its name UKSpliter, its
place, google :)

nb: this method is useless when the av detects a MD5 checksum as
pestpatrol, you change any byte and this is no more detected then...

This is the ultimate way to trick all antivirus , in the old days , had
made the famous rootkit hackerdefender undetected by all of them, to
note sophos and kav harder to trick because they detects signatures ,
wich modded, will probably break your proggie..

cheers to undergroundkonnekt guys :)

Jeroen wrote:
 For penetration testing on Wintel system, I often use netcat.exe and stuff
 like pwdump. More and more I need to disable anti-virus services before
 running the tools to avoid alarms and auto-deletion of the applications. It
 works but it isn't an ideal situation since theoretically a network can be
 infected while the AV-services are down. Recompiling tools is an option
 since the source of many tools I use is available. The question is (before I
 burn useless CPU cycles): can someone help me getting info about the inside
 of AV engines? Will addition of some rubbish to the code do the trick (-
 other checksum), do I need to change some core code or is it a mission
 impossible anyway? Who can help for example getting some useful research
 papers on the subject of detecting viruses and how to bypass mechanisms
 used? Any help will be appreciated.
 
 
 Greets,
 
 Jeroen
 
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/
 
 
 

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (MingW32)
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=xowQ
-END PGP SIGNATURE-
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Inside AV engines?

2005-12-12 Thread Valdis Shkesters

These days, a very popular approach is to pack malicious codes by
different packers to create a large number of pseudo versions. Tests
performed by Eric Johansen from IBM Virus CERT were presented
at the Virus Bulletin 2005 conference. He had packed the generally
known Nimda.a by different packers and tested what was the possibility
of fooling different anti-viruses. Symantec with its on-demand scanner
identified only 33%, McAfee 67%, Trend Micro 57%.

http://files.malwareblog.com/EJohansen_VB2005_Presentation.pdf
http://files.malwareblog.com/EJohansen_VB2005.pdf

Best regards,

Valdis


- Original Message - 
From: Jeroen [EMAIL PROTECTED]

To: pen-test@securityfocus.com; full-disclosure@lists.grok.org.uk
Sent: Tuesday, December 13, 2005 12:56 AM
Subject: [Full-disclosure] Inside AV engines?



For penetration testing on Wintel system, I often use netcat.exe and stuff
like pwdump. More and more I need to disable anti-virus services before
running the tools to avoid alarms and auto-deletion of the applications. 
It

works but it isn't an ideal situation since theoretically a network can be
infected while the AV-services are down. Recompiling tools is an option
since the source of many tools I use is available. The question is (before 
I
burn useless CPU cycles): can someone help me getting info about the 
inside

of AV engines? Will addition of some rubbish to the code do the trick (-
other checksum), do I need to change some core code or is it a mission
impossible anyway? Who can help for example getting some useful research
papers on the subject of detecting viruses and how to bypass mechanisms
used? Any help will be appreciated.


Greets,

Jeroen


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/ 


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Re: 0-day for sale on ebay - New auction!

2005-12-12 Thread sdse
It looks like the same person opened another auction: 

http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItemitem=6588680836 


--
Please do not reply to this address 


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] MDKSA-2005:226 - Updated mozilla-thunderbird package fix vulnerability in enigmail

2005-12-12 Thread Mandriva Security Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___
 
 Mandriva Linux Security Advisory MDKSA-2005:226
 http://www.mandriva.com/security/
 ___
 
 Package : mozilla-thunderbird
 Date: December 12, 2005
 Affected: 2006.0, Corporate 3.0
 ___
 
 Problem Description:
 
 A bug in enigmail, the GPG support extension for Mozilla MailNews and
 Mozilla Thunderbird was discovered that could lead to the encryption
 of an email with the wrong public key.  This could potentially disclose
 confidential data to unintended recipients.
 
 The updated packages have been patched to prevent this problem.
 ___

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3256
 ___
 
 Updated Packages:
 
 Mandriva Linux 2006.0:
 a76040e992150836998fc822a99b7624  
2006.0/RPMS/mozilla-thunderbird-1.0.6-7.2.20060mdk.i586.rpm
 591b78809b7425ece0f63f96b65d2d2b  
2006.0/RPMS/mozilla-thunderbird-enigmail-1.0.6-7.2.20060mdk.i586.rpm
 72f81a292f80666ac90f6b4d6da8a694  
2006.0/RPMS/mozilla-thunderbird-enigmime-1.0.6-7.2.20060mdk.i586.rpm
 5b45958f898c7a0da52227b1b7791eb8  
2006.0/SRPMS/mozilla-thunderbird-1.0.6-7.2.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 7732c8c52831cdc49dcad7f27bf02ff7  
x86_64/2006.0/RPMS/mozilla-thunderbird-1.0.6-7.2.20060mdk.x86_64.rpm
 63d0f9a9e474b6cf8259ee0e3e867c54  
x86_64/2006.0/RPMS/mozilla-thunderbird-enigmail-1.0.6-7.2.20060mdk.x86_64.rpm
 3440b4677c7938a8d948d1f20b97ec33  
x86_64/2006.0/RPMS/mozilla-thunderbird-enigmime-1.0.6-7.2.20060mdk.x86_64.rpm
 5b45958f898c7a0da52227b1b7791eb8  
x86_64/2006.0/SRPMS/mozilla-thunderbird-1.0.6-7.2.20060mdk.src.rpm

 Corporate 3.0:
 fb13fdba83a8fb58fa7be5f879387776  
corporate/3.0/RPMS/libnspr4-1.7.8-0.4.C30mdk.i586.rpm
 d2c026c3005bb117b168fa710b6707eb  
corporate/3.0/RPMS/libnspr4-devel-1.7.8-0.4.C30mdk.i586.rpm
 00fe306b2e32a43b668855ac07a7bc3a  
corporate/3.0/RPMS/libnss3-1.7.8-0.4.C30mdk.i586.rpm
 a1f58fd330e354d64098584a21075683  
corporate/3.0/RPMS/libnss3-devel-1.7.8-0.4.C30mdk.i586.rpm
 ed922dcfda867e3e6aae232358e410d9  
corporate/3.0/RPMS/mozilla-1.7.8-0.4.C30mdk.i586.rpm
 9af2dc6b388b787fa489dd6d50fd85e5  
corporate/3.0/RPMS/mozilla-devel-1.7.8-0.4.C30mdk.i586.rpm
 f8b427e76177e505f4c461c36c58a6f4  
corporate/3.0/RPMS/mozilla-dom-inspector-1.7.8-0.4.C30mdk.i586.rpm
 35ce2664bb8516b0adeb0bcf23814ffa  
corporate/3.0/RPMS/mozilla-enigmail-1.7.8-0.4.C30mdk.i586.rpm
 f794287f76a7aa84f8ab26a5f9e1390d  
corporate/3.0/RPMS/mozilla-enigmime-1.7.8-0.4.C30mdk.i586.rpm
 886465435f0c81de9888a406ecfaf731  
corporate/3.0/RPMS/mozilla-irc-1.7.8-0.4.C30mdk.i586.rpm
 7852834c9f2b9b95d39abe8751d3849b  
corporate/3.0/RPMS/mozilla-js-debugger-1.7.8-0.4.C30mdk.i586.rpm
 42968285510df5716902b6566c8fc9fc  
corporate/3.0/RPMS/mozilla-mail-1.7.8-0.4.C30mdk.i586.rpm
 72ce466eed134f651d10ea9120d21f53  
corporate/3.0/RPMS/mozilla-spellchecker-1.7.8-0.4.C30mdk.i586.rpm
 99c49b1370c18c2fa14c9f20b04e148d  
corporate/3.0/SRPMS/mozilla-1.7.8-0.4.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 6642da49a0bdbec886a932fdab4d41e5  
x86_64/corporate/3.0/RPMS/lib64nspr4-1.7.8-0.4.C30mdk.x86_64.rpm
 065391d250b7ceb31c01f12386cf3a04  
x86_64/corporate/3.0/RPMS/lib64nspr4-devel-1.7.8-0.4.C30mdk.x86_64.rpm
 07cf6b5f1d4ce2212b76fc265aace41a  
x86_64/corporate/3.0/RPMS/lib64nss3-1.7.8-0.4.C30mdk.x86_64.rpm
 e65788bcc7d582095b30a87431947a8f  
x86_64/corporate/3.0/RPMS/lib64nss3-devel-1.7.8-0.4.C30mdk.x86_64.rpm
 a855523066d7b231da9ed889a995ad1a  
x86_64/corporate/3.0/RPMS/mozilla-1.7.8-0.4.C30mdk.x86_64.rpm
 7b894f998bd344841c861387be21c2b3  
x86_64/corporate/3.0/RPMS/mozilla-devel-1.7.8-0.4.C30mdk.x86_64.rpm
 7b5fc684552363acea77ab8f344d38f5  
x86_64/corporate/3.0/RPMS/mozilla-dom-inspector-1.7.8-0.4.C30mdk.x86_64.rpm
 4e969e057bcdc0f763e269cbbfcd0fb9  
x86_64/corporate/3.0/RPMS/mozilla-enigmail-1.7.8-0.4.C30mdk.x86_64.rpm
 c84f31cefbbe5a92c1f1e6105a184fe8  
x86_64/corporate/3.0/RPMS/mozilla-enigmime-1.7.8-0.4.C30mdk.x86_64.rpm
 28791c7db8d3d9802e8198dc599fad87  
x86_64/corporate/3.0/RPMS/mozilla-irc-1.7.8-0.4.C30mdk.x86_64.rpm
 0308af9d9050d5cdeafd0a9baac05d48  
x86_64/corporate/3.0/RPMS/mozilla-js-debugger-1.7.8-0.4.C30mdk.x86_64.rpm
 a993afbf2ed3e7d17734631b2ccee05c  
x86_64/corporate/3.0/RPMS/mozilla-mail-1.7.8-0.4.C30mdk.x86_64.rpm
 86f109cecac0a9de786f88d9400b0cf5  
x86_64/corporate/3.0/RPMS/mozilla-spellchecker-1.7.8-0.4.C30mdk.x86_64.rpm
 99c49b1370c18c2fa14c9f20b04e148d  
x86_64/corporate/3.0/SRPMS/mozilla-1.7.8-0.4.C30mdk.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed 

[Full-disclosure] http://www.offensivecomputing.net

2005-12-12 Thread val smith
Just wanted to let you guys know about a new computer security site at http://www.offensivecomputing.net

The purpose of this site is to foster collaborative analysis,
cataloging and identification of malware in order to improve defense
and awareness.
This was something myself and other colleagues have seen the need for a
long time but could never find anything similar because most malware
collections are either closed lists or corporate non-public collections. This site is free and open to all.

The basic idea is to have a community site where you can search for malware based on name or md5sum and get zipped copies.
People can upload their own samples of malware and collaborate on
analysis in a sort of a blog style. (think community commented
disassembles, graphs, ida databases, etc.)

I know there are some problems with the concept such as using md5sums but its a start and has proven useful already.
I've got some malware collection stuff to help add to the database and I have a small collection built up over the years
that I am slowly adding as well.

I've started it off with some copies of common stuff like welchia, sobig, the sony drm rootkit, etc. and some minimal analysis.

This is NOT another Vx'ers site and the purpose isn't to propagate worms or viruses but rather provide a medium for people to
conduct collaborative defense research with full access to the tools and samples.

We're interested in any feedback, collaborations, and ideas from the
community and have already gotten a ton of response since launching
last Friday.

have a good one,

V.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/